News about Oracle's Solaris and Sun Hardware
System News
Sep 1st, 2014 — Sep 7th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 199, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Completes Initial Tender Offer for MICROS Systems, Inc. with approximately 82.8% of Shares Tendered
Announces Subsequent Offering Period to Permit Additional Shares to be Tendered
Oracle issued a statement, "that the initial tender offer, through its wholly owned subsidiary, Rocket Acquisition Corporation, for all outstanding shares of common stock of MICROS Systems, Inc. (NASDAQ: MCRS) ('MICROS') expired at midnight (New York City time) at the end of September 2, 2014.

The depositary for the tender offer has advised Oracle that, as of the expiration of the initial tender offer period, approximately 62,093,103 shares of MICROS common stock (including approximately 2,096,274 shares subject to guaranteed delivery procedures) were properly tendered and not withdrawn in the tender offer, representing approximately 82.8% of the MICROS shares outstanding. All properly tendered shares have been accepted for payment, which will be made in accordance with the terms of the tender offer..."

Database-as-a-Service Reaches New Heights of Efficiency
Building private database-as-a-service solutions is finally something any enterprise can do
For newcomers to corporate IT, life before virtualization is hard to imagine. Ask any grizzled data center veteran about the old days, though, and that person will tell you all about the time, effort, and money he or she once spent standing up new servers.

Today, of course, provisioning servers can be as easy as launching new virtual machines. Yet for all the advantages virtualization can offer elsewhere in the stack, database professionals young and old alike know all too well that it does nothing to make provisioning, operating, and administering databases any less expensive, hands-on, or time-consuming than it's always been...

    Database Insider Newslettter
    September 2014 issue now available

    This Edition's Content:

    • News, Oracle OpenWorld Spotlight, Video, Webcasts, Featured Podcast, Customer Buzz, Blogosphere, Find an Oracle Partner, Oracle Magazine, Featured Training, Events

    Oracle Database at Oracle OpenWorld: Keynotes, Sessions, and Product Demos

    Oracle OpenWorld 2014 attendees have the opportunity to hear about the latest developments and future directions of Oracle Database solutions from Oracle executives and database experts. Find out what keynotes you should add to your agenda and how to access session and keynote highlights on demand...

    Two Ways IBM Has Over-promised and Under-delivered with POWER8 to Date
    By Kelvin Gee
    Kelvin writes, "IBM launched its first POWER8 systems in April 2014. So now that the dust has settled and the first systems have started shipping, let's take stock of what IBM actually delivered with POWER8.

    IBM has shown on previous roadmaps that it has a 3-year release cycle for new POWER generations. Following that cadence, IBM clearly missed its POWER8 release by more than a year, given that POWER7 systems started shipping the Spring of 2010 and the first POWER8 systems started shipping June 2014..."

    Gartner Positions Oracle in Leaders Quadrant for Integrated Systems
    Architects, integrates, and implements the entire technology stack of hardware and software
    "Gartner, Inc. has named Oracle a Leader in its latest Magic Quadrant for Integrated Systems. Gartner's Magic Quadrant reports position vendors within a particular quadrant based on both their completeness of vision and their ability to execute.

    The authors of Gartner's Magic Quadrant for Integrated Systems define integrated systems as 'combinations of server, storage, and network infrastructure, sold with management software that facilitates the provisioning and management of the combined unit.'..."

    Oracle VM Manager 3.3
    Improvements on Virtual Machine Console Access

    Honglin writes, "Oracle VM 3.3 introduces the new virtual machine console access which uses JavaScript and HTML5 features. There is no longer any requirement to install or run software locally on the client computer. This change reduces complexity and provides a more reliable console tool..."

    Oracle VM 3.3 and Oracle Virtual Networking
    OVN kernel drivers are included with the Oracle VM Server

    Honglin Su writes, "In this week's Spotlight, we are talking about Oracle VM 3.3 with Oracle Virtual Networking. The topic is contributed by Daniel Ritzman, Principal Best Practices Consultant from Oracle VM product management and Satinder Nijjar, Principal Product Manager from Oracle Virtual Networking product management.

    Oracle Virtual Networking (OVN) virtualizes the data center infrastructure and enables connections from any virtual machine (VM) or server to other VMs, servers, network resources, and storage devices. With Oracle VM 3.3, the OVN kernel drivers are included with the Oracle VM Server. It's now much easier to take advantage of OVN Software Defined Network (SDN) capability in your Oracle VM environment..."

    IT - Technology
    Should You Buy Enterprise Applications from a Startup?
    ComputerWorld, September 2nd, 2014
    "The idea of buying an enterprise application from a startup company might sound like anathema to a CIO. But Chris Laping, CIO of restaurant chain Red Robin, based in Greenwood Village, Colo., disagrees. He believes we're in the middle of a significant shift that favors startups -- moving from huge applications with extensive features to task-based activities, inspired by the apps running on mobile devices..."
    Google Partners with UCSB to Build Quantum Processors for Artificial Intelligence
    TechCrunch, September 3rd, 2014
    "Google today announced that it is expanding its research around quantum computing and that it has hired UC Santa Barbara's (UCSB) John Martinis and his team - one of the most prolific research groups in this area - to work on new quantum processors based on superconducting electronics. Researchers in Martinis' lab were among the first to use this technique back in 2008..."
    Why In-Air Gestures Failed, and Why They'll Soon Win
    ComputerWorld, September 2nd, 2014
    "Four years ago, in-the-air gestures were the future of gaming and the desktop PC user interface.

    In 2010, Microsoft launched its Kinect product for Xbox 360 and Leap Motion was founded as a company. For a while, Kinect for Xbox 360 was the fastest selling consumer electronics gadget of all time. And when Leap Motion introduced the Leap Motion controller, minds were blown by the demos.

    The excitement around Kinect has fizzled, among both gamers and game developers. Microsoft recently boosted sales of the Xbox One by removing the requirement to also get Kinect. People aren't using it like they thought. Hardly anyone is using the hyped Kinect for Windows product.

    And Leap Motion has completely failed in the market.

    What happened?..."

    IT - Bitcoin
    Why Bitcoin's Gambling Boom is Only Just Getting Started
    CoindDesk, September 2nd, 2014
    "Gambling is big business, and online gambling represents a significant and growing proportion of that business - about 8% currently.

    Research company H2 Gambling Capital, which values the online gambling market in terms of gross winnings, put the global market value at €21.73bn ($28.54bn) in 2012. Furthermore, the firm expects a 9.13% compound annual growth rate through 2015..."

      Wall Street: Young Talent Leaving For Bitcoin And Hi-tech?
      CryptoCoinsNews, September 5th, 2014
      "Wall Street is a lot more than a place in New York, it is an American institution, and the fortunes of the entire World seem to be inexorably bound to it. For generations the brightest, and most driven, students were recruited into the firms, with household names, that make up the Street. Nowadays, increasing numbers of qualified individuals are choosing the world of cryptocurrency and high technology over Wall Street..."
        Why I'm investing in bitcoins
        Vox, September 1st, 2014
        "I've long been a Bitcoin optimist. You can read my case for Bitcoin here. But a few weeks ago, I decided to put my money where my mouth is and invest in Bitcoins.

        This isn't the first time I've invested in the cryptocurency. In early 2012, I bought some bitcoins for around $7 each. I held them until May 2013, when I took a new job at the Washington Post. The Post's strict ethics rules required me to sell them for around $120 each. That proved to be a huge missed opportunity, as bitcoins skyrocketed to more than $1000 before the end of 2013..."

        Violate the Core Principles of Bitcoin at Your Own Peril
        Bitcoin Magazine, September 2nd, 2014
        "Forbes magazine ran an article on August 24, 'Why There Should be a Bitcoin Central Bank.' If you want the short answer and want to skip the rest of the article, it boils down to this: because that would violate every core bitcoin principle. This article shows the ignorance of most of the world that is deep into yesterday's paradigm of money. This article is intended to establish four founding core principles of bitcoin technology that should act as the signal for 'true north' from which banks, nations, and most importantly, the people of the world will eventually recognize. As people value the many aspects of bitcoin differently it is important to understand the roots of creation that are responsible for the fruits the world is beginning to recognize..."
        Switzerland's Largest University Tests 'Touchless' Bitcoin Payments Solution
        CoindDesk, September 2nd, 2014
        "Switzerland's University of Zurich is integrating a student-made bitcoin payments solution into one of its cafeterias as part of a two-week trial.

        Called CoinBlesk, the mobile payments platform uses two-way near-field communication (NFC) technology and was developed as part of a student project to create an open-source bitcoin spending tool..."

        Can Bitcoin Surpass Credit Cards for Low-Cost Fraud Protection?
        CoindDesk, September 5th, 2014
        "It's almost essential today for merchants to accept credit or debit cards. Indeed, it is often the only form of payment in a customer's wallet.

        However, in exchange for accepting cards, merchants must pay for a number of services that they may not need or want as part of the blanket fees charged by payment processors.

        There are even some examples where merchants offer customers a discount in exchange for paying in cash, such as gas stations in the US, which often advertise a cheaper price to customers using physical money..."

          CNNMoney's Jose Pagliery Talks 'Bitcoin: And the Future of Money' at Bitcoin Center NYC
          CryptoCoinsNews, September 6th, 2014
          "On Thursday, September 4, CNNMoney's Jose Pagliery came to the Bitcoin Center of New York City to talk about his experiences writing his new book 'Bitcoin: And the Future of Money.'

          Working at CNNMoney, he came across the Silk Road events of last year and discovered Bitcoin. It inspired him to further find the depth into the potential this technology can bring. Where he sees the lagging behind of banks and traditional financial institutions, this could and will be the next big development in money and by extension, the modern world..."

          MIT Bookstore Accepts Bitcoin Payments as Campus Interest Grows
          CoindDesk, September 4th, 2014
          "The MIT Coop bookstore, a retail store serving the Massachusetts Institute of Technology (MIT), is now accepting bitcoin for T-shirts, textbooks, school supplies and more.

          The news comes amid increasing interest in bitcoin at the university and ahead of a scheduled 'airdrop' of $500,000 in bitcoin to MIT undergraduates. The project, which will provide $100 to every MIT student, is scheduled to take place sometime later this fall.

          The MIT Coop is already equipped with a bitcoin ATM, a development that Jerry Murphy, of the bookstore's management firm, said made accepting bitcoin a natural decision..."

          IT - FOSS
          5 tips on migrating to open-source software
          TechRepublic, September 1st, 2014
          "Open source is not just for Linux. Yes, you'll certainly find a much larger selection of open-source software for the Linux platform, but both Windows and Apple also enjoy a good number of titles.

          Regardless of what Free Open Source Software (FOSS) you need to use, you might not always find it the most natural evolution -- especially when you've spent the whole of your career using proprietary software. The thing is, a lot of open-source software has matured to the point where it rivals (and sometimes bests) its proprietary counterpart.

          With that in mind, I wanted to offer up my five best tips for migrating a from closed-software ecosystem to an open one..."

          10 Reasons To Use Open Source Software Defined Networking
          Huff Post, September 1st, 2014
          "Open source software (OSS) now has a permanent role in the enterprise IT world. Gartner forecasts that open-source technology will be included in 85% of all commercial software packages by 2015 and 95% of mainstream IT organizations will leverage some element of OSS. One of the fastest growing segments within open software is Software Defined Networking (SDN), which simplifies IT network configuration and management by decoupling control from the physical network infrastructure. The SDN market is projected to surge from $360M to $3.52B in 2018..."
          10 Tips for Managing Open Source Vulnerabilities
          CIO Insight, September 1st, 2014
          "As software development becomes more collaborative, technology organizations are increasingly incorporating open source content into their software development environments. Linux is prevalent in data centers and Apache is in web services. And OSS is more prevalent in the Internet of Things than ever. Developers have used OSS for years and visit repositories like GitHub to quickly solve problems, rather than write code from scratch.

          "A structured OSS adoption process can create a competitive advantage for technology companies by allowing them to leverage off-the-shelf quality software, accelerate development and reduce costs," says Mahshad Koohgoli, CEO of code attributes management company Protecode. OSS is peer-reviewed, which usually results in good quality, but like proprietary code, it is susceptible to security vulnerabilities. Licensing compliance and export controls must also be taken into account, depending on company location and where it sells products. These concerns can be managed, however, as outlined in Protecode's tips below..."

          MySQL as your Embedded Database
          White Paper by Diana Gray, Principal Curriculum Product Manager, Oracle University
          Diana Gray, notes that "Over 3,000 ISVs, OEMs and VARs choose MySQL for this purpose and benefit from significant cost savings when compared to using a competing database product. MySQL enables the cost-effective delivery of reliable, high-performance and scalable web-based and embedded database applications.

          Now you can benefit from targeted training that will cover advanced features, management tools and technical knowledge needed to develop, deploy and manage your MySQL applications..."

          MySQL Workbench 6.2.2 RC has been released
          final release candidate for MySQL Workbench 6.2.

          Balasubramanian writes, "MySQL Workbench 6.2 is the upcoming major update for the official MySQL graphical development tool.

          MySQL Workbench 6.2 focuses on support for innovations released in MySQL 5.6 and MySQL 5.7 DMR (Development Release) as well as MySQL Fabric 1.5, with features such as:

          • A new spatial data viewer, allowing graphical views of result sets containing GEOMETRY data and taking advantage of the new GIS capabilities in MySQL 5.7.
          • Support for new MySQL 5.7.4 SQL syntax and configuration options.
          • Metadata Locks View shows the locks connections are blocked or waiting on.
          • MySQL Fabric cluster connectivity - Browsing, view status, and connect to any MySQL instance in a Fabric Cluster.
          • MS Access migration Wizard - easily move to MySQL Databases.

          Other significant usability improvements were made...

          MySQL Enterprise Monitor 3.0.14 has been released
          Provides real-time visibility into the performance and availability of all your MySQL databases

          Andy Bang writes, "We are pleased to announce that MySQL Enterprise Monitor 3.0.14 is now available for download on the My Oracle Support (MOS) web site. It will also be available via the Oracle Software Delivery Cloud in a few weeks. This is a maintenance release that includes a few new features and fixes a number of bugs. You can find more information on the contents of this release in the change log..."

          MySQL Enterprise Backup 3.11.0
          MEB 3.11.0 focuses on enhancing backup/recovery performance

          Priya Jayakumar writes that "MEB 3.11.0 focuses on enhancing backup/recovery performance and adding new features that would help database administrators.

          This release addresses some of the challenges customers face today while taking backups of very large databases(in terrabytes). This release also provides more complete backup with all the necessary logs required to clone a server. We have also added online restore of tables in 3.11.0 to help DBAs fix corrupted tables in the server from existing backups..."

          Cloud Computing
          Cloud storage for MySQL Enterprise Backup (MEB) users
          What do you need to start using MEB with Amazon S3 service?
          Sveta Smirnova blogs, "Jothir wrote great blog post, introducing MEB's "Backup to Cloud" feature. And while this blog post is great source of information for Amazon users who consider using MEB it is not so clear how to setup the cloud storage itself for those MEB users who are only considering storing backups in the Cloud. I actually was one of them and decided to share my experience.

          OK, so what do you need to start using MEB with Amazon S3 service?..."

          IT - Cloud
          After iCloud Leak, How can We Protect Cloud Data?
          CIO Today, September 3rd, 2014
          "When nude celebrity selfies start leaking en masse, it certainly gets your attention. Actress Jennifer Lawrence, singer Rihanna and model Kate Upton were among the celebs whose pics, videos and other personal files flooded the Internet on Sunday.

          We caught up with Greg Foss, a senior security Relevant Products/Services research engineer at security intelligence Relevant Products/Services firm LogRhythm, to get his take on the fallout, who's to blame and how to protect data Relevant Products/Services in the cloud Relevant Products/Services. He told us according to information released publicly so far, celebrity iCloud accounts were the primary targets..."

          Celebrity Photos Scandal a Wake-Up Call for Cloud Users
          IT World, September 2nd, 2014
          "An apparent hack of cloud storage sites that caused a slew of nude images of female celebrities to hit the Internet over the weekend should serve as a wake-up call for the public and for enterprises to be more cautious with the information they store on the cloud.

          Whether the scandal will make some enterprises, already nervous about cloud security, more hesitant about migrating to the cloud remains to be seen..."

          Cloud won't Cure Licensing Woes
          Information Week, September 2nd, 2014
          "What could be simpler than cloud-based, pay-per-use, and pay-per-user subscriptions? You can see in real time everything you're buying and using, right? Well, it's not that simple.

          Virtualization, private cloud, and public cloud deployment options have only added to licensing complexity, introducing a mix of on-premises, per-CPU, per-VM, per-use, and per-user licensing models in this brave new hybrid world. Only 26% of companies represented in our InformationWeek Software Licensing Survey say they don't use software-as-a-service..."

            Mapping the Cloud: Where Does the Public Cloud Actually Live?
            Network World, September 2nd, 2014
            "Tech public relations likes to talk about the cloud as though it exists in an entirely conceptual form - files, apps, and even computing power existing merely in potentia, flowing mystically to you from some digital Olympus. It's a neat vision, and not, perhaps, an entirely unfair one, as far as it goes.

            But the fact remains that all computing is done on silicon that exists somewhere in the real world, no matter how many layers of abstraction it goes through. If it's a computing task, there is a real computer, somewhere, pushing 1s and 0s around to make it happen..."

              Scientists Teach Enterprises How to Process Big Data
              SearchDataCenter, August 28th, 2014
              "Enterprise IT shops can learn a lesson in big data processing from a computing infrastructure that supports Higgs-Boson researchers and crunches numbers from the Big Bang.

              Research data center scientists are the cowboys of the computing world, but the research computing IT architecture has carry-over potential into enterprises grappling with how to process big data..."

              Six Tips for Taming Shadow IT
              IT World Canada, September 2nd, 2014
              "Cloud computing offers advantages to enterprises, but only when done through a well-defined IT strategy. When done by individuals or lines of business - the so-called Shadow IT - unmonitored IT activity could post a significant risk. Yet sometimes the cloud moves faster than IT to meet business needs In a recent report PricewaterhouseCooper outlines how to prudently say yes to the cloud..."
              The Future is Now: Survey Says Cloud Here to Stay
              CRN, August 28th, 2014
              "Evolve IP, a cloud services provider, just released the results of its 2014 Cloud of Dreams survey.

              The blind, web-based survey was conducted in June and queried 1,257 respondents. More than 28 percent of them were C-level executives; another 7 percent were vice presidents; 22 percent were IT directors; 17.5 percent were IT managers; and the final quarter were other IT professionals.

              Just over three-quarters of the survey group work for organizations with revenues between $1 million and $500 million, and 70.5 percent of their companies have between 50 and 500 employees..."

                There's Spam in Them Thar Clouds
                Demartek, August 29th, 2014
                "With all the hype associated with 'cloud computing,' I decided to do some testing of the world's public cloud infrastructure over the past few days. I was not trying to boil the ocean, but had a very specific hypothesis and set of tests in mind.

                Conventional wisdom suggests that unsolicited commercial email (UCE), also known as spam, originates from compromised computers all over the world, and I have every reason to believe that spammers use this technique. My hypothesis, however, is that public cloud infrastructure is a major source of spam on the Internet..."

                What to Do if Your Cloud Provider is Acquired
                Network Computing, August 29th, 2014
                "With consolidation on the rise in the cloud computing market, you could end up dealing with a new cloud provider. Here are the key steps to take and questions to ask.

                The cloud computing space is finally beginning to mature. And because of this, smaller providers are being bought and absorbed by larger players trying to grab a foothold in new geographic markets or verticals. A recent example of cloud provider consolidation trend is Canadian telecom giant Shaw Communications' acquisition of Colorado-based ViaWest..."

                IT - CxO
                5 Signs You'll Face a Software Audit
                Information Week, September 2nd, 2014
                Software vendors have automated ways to monitor usage of their products, and the larger the company, the more they pay attention to "red flags" that it may be time to run an audit, says IDC's Amy Mizoras Konary. Here are five customer events that Konary says can tip a vendor to do a software audit:
                A Strategy for Strategy: Figuring Out How to Figure Out What IT Should Do Next
                ComputerWorld, September 2nd, 2014
                "Many CIOs and their organizations, lacking not only the harsh tooth-and-claw reality of nature but also a real IT strategy, never really wake up. Sixty-one percent of the IT organizations in the Global 2000 are sleepwalking their way to middle-of-the-pack/it's-good-enough performance levels. This shocking data point (which first surfaced during research I conducted for the U.S. Navy and was validated by work done in support of my book The New Know) leads me to conclude that many CIOs need a 'strategy for strategy' They need to think hard about how they determine what IT should do next..."
                Goals are Great, Except When they're Not
                ComputerWorld, August 28th, 2014
                "'Just give me the numbers!'

                Falling firmly into the 'I just can't make this stuff up' category, the preceding statement was made by the head of an engineering department. He wanted the performance figures on a series of database lookups so that he could determine if the database code was performing up to specifications. This would be a perfectly reasonable request, except for one minor problem: The database code was not producing the correct results in the first place. Performance was sort of irrelevant given that getting the wrong answers quickly is not necessarily all that helpful, although it may be less irritating than having to wait for the wrong answers. It's rather like driving at 75 mph when lost; you may not know where you are or where you are going, but at least you'll get there quickly. Or something..."

                IT Security is a Matter of Accountability
                Help Net Security, September 1st, 2014
                "For today's CEO, being the victim of criminal hackers is no longer just a source of embarrassment. Being hacked often carries legal ramifications and can even cost you your job. We live in the age of transparency, where 'mega breaches' and data theft from an organization are increasingly hard to keep from the customer. It has never been more challenging for a CEO who must accept responsibility for IT security incidents, thoroughly assess the risks and remain vigilant to potential threats..."
                Why We like Shiny New Toys
                Information Management, September 4th, 2014
                "I recently presented at an analytics conference where a speaker in one of the customer marketing tracks said something that stimulated my thinking. He said, 'Just because something is shiny and new or is now the 'in' thing, it doesn't mean it works for everyone.'

                His statement got me thinking about some of the new ideas and innovations that organizations are being exposed to and experimenting with. Are they fads and new fashions or something that will more permanently stick? Let's discuss a few of them..."

                Your Hiring Formula - Recruit for Attitude, Train for Skill
                TLNT, September 4th, 2014
                "When hiring for a new position, all employers want to recruit the most talented and skilled candidates possible - preferably with a great attitude, too.

                In reality, it is becoming increasingly difficult to find potential hires who 'have it all.' All too frequently, these 'have it all' individuals aren't actively seeking a move.

                Instead, employers are faced with an ever decreasing talent pool where the right combination of attitude, culture fit, and skills are difficult to find in one person..."

                  vBeers @ Broward - Funky Buddha - Wed Sept. 10th
                  6pm - 9pm
                  Join us for vBeers @ Broward. We meet on the 2nd Wednesday of each month in Broward. The meetings will be at Funky Buddha which is 5 minutes east of I95.

                  This event will be a non-sponsored event so bring your wallet, your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community (including YOU!).

                  • Funky Buddha Brewery
                  • 1201 NE 38th St
                  • Oakland Park, FL 33334

                  Please Register.

                  Join us for one of the three South Florida vBeers events. The South Florida vBeers events happen three times a month, once per county:

                  IT - DR
                  Hard-Won Experience: Lessons from America's Biggest Disasters and Emergencies
                  Government Technology, August 29th, 2014
                  "Katrina. Sandy. The Boston Marathon bombing. 9/11.

                  Some emergencies are indelible on the national consciousness to the point that they need no introduction. These tragedies are looked back upon as touchstones in America's quest to be as prepared as possible for the next disaster.

                  Perfection is an impossible goal, but the public officials who've been at the center of response and recovery efforts can't help but reminisce on what went wrong and right, what works and what doesn't, and how their experiences might be useful for others forced to live through a similar event..."

                    IT - PM
                    The Perils of Petascale IT Projects
                    Federal Computer Week, August 29th, 2014
                    "Good news: We no longer have to talk about megascale IT projects. Large-scale ventures that typically cost $1 billion or more, megaprojects used to be all the rage, but they are quickly being superseded by petascale IT initiatives. Those projects can cost even more, involve complexity on a truly massive scale and require petaflops of computer processing.

                    Despite the horrendous track record of delivering on even moderately complex IT projects, public-sector CIOs continue to embrace the design, planning and execution of petascale IT projects. Consider the Department of Homeland Security's SBInet, a component of the Secure Border Initiative. The $8 billion project commenced in 2006 and aimed to place surveillance systems along the southwest border of the U.S. to identify and prevent illegal crossings..."

                    IT - Networks
                    Bypassing Hardware Firewalls in 20 Seconds
                    Network World, September 2nd, 2014
                    "If you 'need' persistent interactive C&C communication to a secure RDP server, but were stopped by hardware firewall restrictions, then you might be interested in a tool released at Def Con that can 'bypass firewalls, application whitelists, secure remote desktops under 20 seconds'..."
                    Can SDN Usher in Better IT Security?
                    Network World, August 29th, 2014
                    "That software-defined networking (SDN) is a coming reality is starting to gain traction in IT security circles, with some vendors arguing it could lead to a level of interoperability in security largely missing at present..."

                    'SDN we see an as open network that gets people away from proprietary ways of defining networks,' says Kurt Roemer, chief security strategist at Citrix Systems, adding in the future, networks will be defined through more open dynamic 'flows' rather than more vendor-dependent, IP-based relationships. Roemer even says he anticipates that the Linux Foundation's OpenDaylight project, which is bringing vendors together to ensure openness in SDN products, could result in more secure networks..."

                    Five SDN Protocols Other than OpenFlow
                    SearchSDN, August 28th, 2014
                    OpenFlow is the earliest standard interface defined between the control and forwarding layers of SDN architecture, but issues exist with security, scalability and the need for specialized hardware. We found five SDN protocols other than OpenFlow.
                    How To Survive In Networking
                    Network Computing, August 28th, 2014
                    "Jeremy Schulman shares his secrets for navigating the transition in network operations by leveraging lessons learned from DevOps. Networking professionals are on the cusp of a significant change, but one that lurks behind the scenes of flashy trends like SDN and IoT. "Fundamentally, I believe there is a convergence in IT that is going to happen -- or that is happening -- right now," said Jeremy Schulman.

                    That's why he launched his new company, Schprokits, this summer.

                    How SDN LTE could Simplify Network Management
                    SearchSDN, August 28th, 2014
                    "LTE is growing fast, but so are the network management challenges that come along with it. SDN LTE could be the game changer, bringing centralized control for a simpler network...

                    The insatiable demand for high speed LTE mobile networks presents incredible opportunity to operators, but it also introduces significant challenges. Beyond the need for scale and bandwidth, the move to LTE poses a slew of operational and management issues that SDN and network virtualization may be able to resolve..."

                    Network Security Challenges in the Enterprise
                    Network World, September 2nd, 2014
                    "ESG recently published a new research report titled, Network Security Trends in the Era of Cloud and Mobile Computing (note: I am an ESG employee). In this project, ESG surveyed 397 IT security professionals working at enterprise organizations (i.e. more than 1,000 employees) and asked a multitude of questions about their current and future network security policies, practices, and technologies.

                    Here is a list of the top 5 network security challenges at enterprise organizations:..."

                    Network Vulnerabilities IT Admins can Use to Protect Their Network
                    Help Net Security, September 4th, 2014
                    "Being able to adapt to change is one of the most important abilities in security today, mostly because attacks to defend against are able to do the same. The sophistication of current threats is mainly seen in their skill to adjust based on the weaknesses of the environment they are targeting.

                    In this post, we will try to see networks the way attackers see them -through their vulnerabilities - and turn these around into guides for how IT administrators should protect their network..."

                    Router Malware: Fact or Fiction?
                    CSO Online, August 28th, 2014
                    "Malware affecting a computer's operation is not always found in the computer itself. Just recently we encountered a common operational issue on several computers in our home network. Various browsers on different computers running different operating systems were intermittently redirecting webpages. The issue manifests itself by redirecting webpages to an unfamiliar merchant site..."
                      Ten Free or Low-Cost Network Discovery and Mapping Tools
                      Information Week, September 1st, 2014
                      "One of the most useful adages for security professionals is "know thyself"--and when it comes to network security, the most fundamental task of knowing oneself is network discovery and mapping. Without up-to-date network diagrams and inventory lists, it is hard to even understand what you're protecting. The following tools can aid the process at little to no cost beyond man-hours..."
                      IT - Operations
                      NSA Exploring Use of Mineral Oil to Cool its Servers
                      Data Center Knowledge, September 4th, 2014
                      "Security secrets may soon be stored on swimming servers. The National Security Agency has been testing the use of immersion cooling for its massive data centers, dunking servers in tanks of a coolant fluid similar to mineral oil. The agency says the technology has the potential to slash cooling costs.

                      'The National Security Agency's Laboratory for Physical Sciences (LPS) acquired and installed an oil-immersion cooling system in 2012 and has evaluated its pros and cons,' the agency said in a technology publication. 'Cooling computer equipment by using oil immersion can substantially reduce cooling costs; in fact, this method has the potential to cut in half the construction costs of future data centers..'"

                      Software-Defined Data centers Pique
                      SearchServerVirtualization, September 4th, 2014
             " title="Software-Defined Data centers Pique "> "Interest among IT pros for building software-defined data centers is rising, with many enterprise users disclosing plans to start weaving pieces of these technologies into existing platforms and infrastructure.

                      At VMworld here this week, VMware technologies positioned the data center ops team as the lead stakeholder as barriers between storage, networking and computing tasks begin to fall. Not that specialists will disappear, but rather, hardware management will be substituted with role-based access control that can be distributed, according to each enterprise's own functional roles..."

                      Software-Defined Data Centres Boost Efficiency
                      IT Web, September 2nd, 2014
                      "Businesses are at a crossroads where IT departments are faced with a choice between software-defined data centre or hardware-defined data centre for building and managing data centres.

                      According to Ian Jansen van Rensburg, senior manager: systems engineering, VMware Southern Africa, using hardware-centric infrastructure for computing, storage, network, security and management is a closed architecture that can be costly and time-consuming to implement.

                      However, moving these components into software (virtualising these components) will dramatically increase efficiency while lowering costs..."

                      Spending Tips for Each Stop on the IT Lifecycle
                      SearchDataCenter, September 4th 2014
                      "Data center equipment refreshes are expensive and time-consuming, but there are ways to ease the most arduous steps of the IT lifecycle -- and possibly even make a little money.

                      Data center hardware lives to serve the applications that run on it. In a world of increased hardware commoditization, virtualization and cloud, IT pros have expanded options during the product lifecycle.

                      The average IT product lifecycle is roughly five years, but some applications reside on the same hardware for much longer than that..."

                        IT - Security
                        Why are Security Pros Blasé About Compliance?
                        Dark Reading, August 29th, 2014
                        "A survey of 500 IT and security decision makers in the UK and US shows that a majority are in the dark about regulatory requirements for their business organization.

                        Regulatory compliance is often seen as an oppressive demand on an organization, something that must be adhered to because, well, it just has to be, rather than because it benefits the business..."

                        5 Tips for Security Behavior Management Programs
                        Help Net Security, September 4th, 2014
                        "Security awareness has long been a point of frustration for information security professionals. While many organizations conduct awareness training of some kind, they have struggled to develop effective training, as posters and knick-knacks urging employees to change passwords frequently have failed to improve their security behavior. Consequently, employee behavior continues to be a common cause of data breaches, with some in the industry even concluding that improving user behavior is impossible.

                        Improving user security behavior is not impossible; but it does require a change in approach. These five tips provide a roadmap for establishing a security behavior management program that measurably improves security posture..."

                        11 Steps Attackers Took to Crack Target
                        Network World, September 2nd, 2014
                        "Aorato, a specialist in Active Directory monitoring and protection, delivers a step-by-step report on how attackers used the stolen credentials of an HVAC vendor to steal the data of 70 million customers and 40 million credit cards and debit cards from the retailer...

                        Despite the massive scale of the theft of Personal Identifiable Information (PII) and credit card and debit card data resulting from last year's data breach of retail titan Target, the company's PCI compliance program may have significantly reduced the scope of the damage, according to new research by security firm Aorato, which specializes in Active Directory monitoring and protection..."

                        Are Breaches Inevitable?
                        ComputerWorld, September 3rd, 2014
                        "Is there a reason that data breaches have been happening at a rapid clip lately? And is there more that we, as security managers, should be doing to make sure that our own companies don't join the ranks of the breached?

                        Home Depot is the latest company to make headlines for a potentially big data breach, and it just might be the biggest one yet. The current record holder is Target, and we've more recently seen the company that owns grocery store chains Supervalu, Albertsons, Acme Markets, Jewel-Osco and Shaw's compromised by hackers. J.P. Morgan and four other major banks appear to have fallen victim to security breaches..."

                        Biometric Authentication Moves beyond Science Fiction
                        Security InfoWatch, August 27th, 2014
                        "It is a tenet of modern security that the identity of an individual who has undergone a security clearance process must be uniquely associated with that individual, and only that individual, in order to obtain access to secure facilities or systems. It has been obvious for years, however, that simple identification tokens such as a driver's license and photo ID cards do not adequately fulfill this requirement. Computer systems typically use knowledge-based identification systems requiring a password or personal identification number (PIN). However, human nature being what it is, passwords and PINs can sometimes be guessed, stolen or, with the proper software tools, easily determined..."
                        Why Russian Hackers are Beating Us
                        CSO Online, August 28th, 2014
                        Russian hackers like the ones who breached the computer systems of JP Morgan Chase and at least four other banks win because they think strategically like the best chess players.

                        "Russians are more intelligent than Americans," Tom Kellermann, chief cyber-security officer for Trend Micro, said. "They're more intelligent because they think through every action they take to a point where it's incredibly strategic.

                        Why You don't Need Long, Complex Passwords
                        InfoWorld, September 3rd, 2014
                        "Password theft and misuse is so widespread, when only a few million are stolen in one cyber heist, it doesn't even make the news. Today, it has to surpass -- or claim to surpass -- a billion, I guess.

                        Articles in the wake of such scintillating criminal exploits tend to advocate the same bad remedies. If I see someone recommend a long and complex password again, I think I'm going to puke..."

                          IT - Careers
                          6 Ways to Lose the Tech 20
                          Information Week, September 4th, 2014
                          "Can working in IT make you fat? If the majority of your workday is spent in a chair, then it's entirely possible.

                          In fact, according to an article in Men's Health, "Sentenced to the Chair," a worker who stands all day (think store clerks) burns about 1,500 calories while on the job, while a person sitting behind a desk expends about 1,000 calories.

                          After only eight months of starting sedentary work, a person will gain an average of 16 pounds, according to the Men's Health article, citing research from the University of North Carolina at Wilmington..."

                          Geekend: Fight Zombies, or Go to Mars?
                          Information Week, August 29th, 2014
                          Bear with me as I paint a picture of how I came across the geekiest question ever asked. I was at a party with 20 or 30 of my oldest friends, mostly from college, all with serious geek cred. In the room were engineers, IT pros, writers, and sci-fi fans galore. On most questions throughout the night, there was generally a consensus -- except one.
                            Government vs. Private-Sector Procurement: An Unfair Comparison
                            Government Technology, August 29th, 2014
                            "The travails of threw the spotlight once again on government procurement, providing the public and pundits alike plenty of fodder for criticism.

                            But let's put things in perspective. The high cost and lack of performance of the website is not the sole responsibility of the current administration. It's just the latest installment in an ongoing series that has brought us the $600 toilet seat, the $100 hammer and the $900 control switch..."

                            Keep Your Personal Information, Personal: What the Celebrity Photo Hack Can Teach Us
                            Business 2 Community, September 3rd, 2014
                            "You may not be Jennifer Lawrence or Kate Upton, or even know or care who those women are, but you should be aware of the latest 'scandal' that included risqué photos of the pop stars and the good old cloud.

                            Over the Labor Day weekend, it was reported that nude photos of the high-profile celebrities were leaked online via the web forum, 4chan, by a 'hacker' who was able to get into the celebrities. personal phone storage and lift the photos from their cloud accounts. The hacker reportedly was looking to make some cash off the photos (although the identity of the hacker hasn't been uncovered) and had made an announcement that there were more photos that would stay under wraps if he/she received PayPal donations..."

                              IT - Social Media
                              Your Expectation of Privacy On Facebook Is a Fantasy
                              CSO Online, August 28th, 2014
                              "Here we go again. It's been a few months since I've seen this kind of story run across my news feed, but it is far from unique. It goes like this: Woman posts something on Facebook with the assumption that it will be seen only by her network of friends and will not be publicly accessible. However, her post somehow makes its way public, and now she is facing the consequences of her actions.

                              This time, the person in question is a Florida mother named Ashley Habat, who had her 4-year-old child enrolled in a private school called Sonshine Christian Academy. Habat was apparently angered about the timing of picture day at the school and went on her Facebook page to vent about it in her status update..."

                              Why Social Media Matters in IT Hiring
                              Information Week, August 31st, 2014
                              "If you're thinking about panning your employer on Facebook or LinkedIn, think again. You might be shooting yourself in the foot when it comes to getting your next job. A TEKsystems survey on IT hiring trends shows that 68 percent of IT leaders would eliminate a candidate from consideration for a single negative social media post about his or her current employer. On the flip side, 63% of IT pros surveyed said they wouldn't consider a potential employer if they saw between one and five critical social media comments about that company..."
                              IT - Virtualization
                              SDN and Network Virtualization: A Reality Check
                              Network World, September 1st, 2014
                              "Software Defined Networking technology is maturing and there are several real world use cases, but for most shops it is still a question of figuring out how to get there from here. We analyze the promise and the options..."
                                IT - Backup
                                Why Virtualized Backup Design Matters
                                Storage Newsletter, September 5th, 2014
                                "VM specific backup solutions like Veeam are increasingly being used to protect virtualized environments instead of more traditional enterprise backup systems. They provide a seamless way to non-disruptively and efficiently backup virtual machine data plus they include a number of advanced features like change block tracking (CBT) of VMs, replication and the ability to perform recoveries directly off disk backup resources. Most disk based backup appliances, however, weren't designed with these features in mind. As a result, organizations using Veeam may incur backup performance problems which could lead to extended backup and recovery windows and missed SLAs..."
                                Oracle Claims ZFS ZS3 Storage boots 16,000 VMs in under 7 mins., outperforms NetApp's FAS6000
                                Rose Meadows, SiliconANGLE, September 5th, 2014
                                Rose writes, "For years, customers have reported that Oracle resisted embracing VMware, preferring to offer clients Oracle Virtual Machine (OVM) instead. Realizing that a large portion of its customers run VMware, Oracle has seemingly broadened its strategy to be more inclusive and is targeting VMware installations.

                                At this year's VMworld, Oracle Corporation claimed its ZFS Storage ZS3 Series was the only storage in-memory centric architecture on the floor. According to Oracle, its system stumps NetApp, Inc.'s FAS6000, which boots 1,000 virtual machines (VMs) in under 20 minutes..."

                                IT - Big Data
                                Big Data, Big Pay: 10 Data Jobs with Climbing Salaries
                                Network World, September 1st, 2014
                                "The corporate appetite for big data is translating into rising salaries for IT pros. In its 2014 Salary Guide, Robert Half Technology (RHT) identifies 10 IT jobs in the data/data administration field. The highest paying is data warehouse manager, with starting salaries ranging from $115,250 to $154,250. The biggest raise goes to business intelligence analysts, who can expect a 7.4% boost this year. Read on to learn more about the salaries, skills requirements and typical duties of 10 data-centric IT jobs..."
                                Big Data is Big Noise
                                Help Net Security, September 3rd, 2014
                                "Big Data was supposed to be the solution to all our security problems, but this spotlight on intruders turned out to be a mess of white noise. Hiding comfortably in that noise, however, are legitimate indicators that point to valid network threats, such as suspicious user behavior.

                                There is still an immense opportunity to use Big Data security analytics to fish out these attacks, but you can't just attach an engine on top of every piece of data that's collected and expect it to miraculously extract intelligence. For an engine to be effective, it needs to focus not on the biggest data, but the most valuable.

                                The challenge for businesses is understanding that not all data is created equal and determining which feeds are truly important. There are three steps businesses can take to begin optimizing Big Data for analytical purposes..."

                                Why the 'Three V' May not Help your Big Data Initiative
                                Information Management, September 3rd, 2014
                                "Tony Cosentino, vice president and research director at research and advisory services firm Ventana Research, sees unanticipated outcomes and challenges with big data implementations. He warns that defining big data by the 'three Vs' - volume, velocity and variety - turns into a very technical discussion and encourages organizations to focus instead on the decision-making process to find the most value from the data.

                                Cosentino discussed his perspective and recommendation of an alternate way to define big data with Information Management in a recent interview..."

                                IT - Mobile
                                BYO Workstyle: People Bring More Than Devices to Work
                                Business 2 Community, August 31st, 2014
                                "We've been talking about trends like BYOD, user-centered IT and the consumerization of IT for years now. But most of the discussion has been about devices, security and compliance.

                                Important topics. But they kind of miss the point.

                                People today have a digital lifestyle that works. They store content in the cloud, share and remix it with friends, and crowdsource answers on Facebook and LinkedIn. It's the modern lifestyle we've all come to expect - connecting, communicating and collaborating anywhere, anytime on any device.

                                People aren't just bringing iPhones to the office, or storing work files on Dropbox. They're bringing a more engaged and productive lifestyle to work..."

                                California Smartphone Kill-Switch Law: What It Means
                                Information Week, August 29th, 2014
                                On Aug. 25, California Governor Jerry Brown signed Senate Bill 962, which requires "kill switches" on smartphones sold in California, starting July 1, 2015.

                                The bill narrowly failed a vote in the California State Senate in April because of concerns it would be bad for business. It passed when revisited in August. In an effort to avoid the imposition of a mandatory kill switch requirement, CTIA-The Wireless Association, a wireless communications trade group, proposed a voluntary agreement to include "a baseline anti-theft tool" in US smartphones that could be either pre-loaded or downloaded.

                                Four Tips from a Reformed CTO for Making the Most of BYOx
                                SearchCIO, September 1st, 2014
                                The thing that makes life in IT so interesting is also the thing that makes it daunting -- everything can, and likely will, change and change quickly. Social is now embedded into most of what we do. Mobile networks get faster and mobile devices get smarter. Advanced analytics are just a data scientist away. And, the breadth and reliability of cloud services just keep increasing. For good measure, let me throw in one more change that accompanies all of these -- IT is no longer in control of what applications we run or where they run.
                                IT - BYOD
                                BYOD to BYOA: Shaping the future of your work environment
                                Information Week, September 1st, 2014
                                "The Bring Your Own Device (BYOD) trend has been growing in a number of businesses for the past few years. Now, a different, yet related, trend has emerged - Bring Your Own Application (BYOA). BYOA allows employees to choose and use the software they believe helps them perform their jobs best and bring these programs into the office on their devices. These applications range from meeting and organization programs to sales software, and many of them are based in the cloud. While there are many benefits to BYOA for employees' daily work, IT departments are challenged with keeping the company's data safe in this environment..."
                                Eight Steps for Comprehensive BYOD Governance
                                SearchCIO, September 1st, 2014
                                With the proliferation of mobile bring your own devices and applications; CIOs have entered into a new era of governance challenges, at the very least. Many organizations have jumped in and enthusiastically embraced these new technologies and, as many pioneers do, have the benefits and the scars to show for their efforts. Many others, however, have been extremely conservative (politically correct term for slow) in their approach to adopting BYOD and BYOA, mainly because of the known and unknown risks that they pose.
                                Top Ten Articles for last few Issues
                                Vol 198 Issues 1, 2, 3, 4 and 5; Vol 197 Issues 2, 3 and 4
                                We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                • European Commission Clears Oracle's Acquisition of MICROS
                                • Multi-node Solaris 11.2 OpenStack on SPARC Servers
                                • How to Get the Best Performance from Oracle VM Server for SPARC
                                • Video: Oracle and Intel Collaboration
                                • Building and Deploying Nagios on Oracle Solaris 11
                                • Brendan Gregg's Quick Reference Page for Linux Performance
                                • Migratory Solaris Kernel Zones
                                • Five Reasons Why CEOs Should Love the Cloud
                                • Updated Oracle VM Storage Connect Plug in for NetApp is Here
                                • Learn All About MySQL Cluster

                                The longer version of this article has list of top ten articles for the last 8 weeks.

                                  IT - Encryption
                                  When Meeting the IT Security Standard Isn't Enough
                                  IT World Canada, September 1st, 2014
                                  "There's a price to be paid for organizations that aren't on the leading edge of security - they usually get caught.

                                  That's the lesson from an incident a Canadian penetration tester ran into while probing the system of a retailer here, outlined by PC World. He was able to gain remote access to the store's systems and download some data from the point of sale system - including his own credit card number.

                                  It was the same hole that attackers have used to recently exploit the systems of retailers including Target and others by RAM scraping..."

                                  IT - Server
                                  NIST to Sys Admins: Clean Up Your SSH Mess
                                  The Register, August 25th, 2014
                                  "NIST has taken a look at how companies use Secure Shell (SSH), and doesn't much like what it sees.

                                  In spite of the depth of access generally handed SSH implementations for a host of different activities - 'file transfers, back-ups, software/patch management, disaster recovery, provisioning and data base updates', as SSH (the company) says - users aren't working hard enough to protect those activities..."

                                  Patching: The Least Understood Line of Defense
                                  Help Net Security, August 29th, 2014
                                  "When it comes to security, only a total dope doesn't understand firewalls, anti-virus and at least the basics of passwords.

                                  But how many end users, indeed how many IT pros, truly get patching? Sure, many of us see Windows install updates when we shut down our PC and think all is well. It's not. Our clients and especially our servers are exposed to all kinds of grief unless they are regularly and properly patched..."

                                  LibreOffice 4.3.1
                                  The Document Foundation, August 28th, 2014
                                  The Document Foundation announced LibreOffice 4.3.1, the first minor release of LibreOffice 4.3 'fresh' family, with over 100 fixes (including patches for two CVEs, backported to LibreOffice 4.2.6-secfix, which is also available for download now).

                                  All LibreOffice users are invited to update their installation as soon as possible to avoid security issues. This includes users who are running LibreOffice 4.2.6 as originally released on August, 5th 2014.

                                  Mobile Tornado Accelerates Product Deployment with Solaris Zones
                                  Leverages Zones V2V capability
                                  Orgad Kimchi writes, "Mobile Tornado is a long-standing partner and hardware OEM of Oracle which provides Instant Communication services for mobile devices, with a focus on enterprise workforce management.

                                  In our ever-changing business environment where products are outdated quickly and on-premise integration cost is sky-rocketing, Time-to-Market (TTM) is becoming the key factor for a successful technology adoption by end-customers. Mobile Tornado asked Oracle ISV Engineering to help them with the design and implementation of a new rapid provisioning environment in-house in order to improve their TTM by reducing the time it takes to deploy their solution at the customer's premises..."

                                  Level3 News
                                  tw telecom to Provide Business Ethernet to Data Foundry's new Houston 2 Data Center
                                  tw telecom's industry-leading network solutions also available at Data Foundry's current Austin and Houston data centers
                                  tw telecom announced continued strong growth for its business relationship with Data Foundry, a leading provider of data center colocation, disaster recovery and managed services. In addition to providing Business Ethernet network capabilities to Data Foundry's existing Austin and Houston data centers, tw telecom will be one of the first network service providers to extend its network capabilities to Data Foundry's Houston 2 data center, a 350,000 square- foot data center currently being constructed in North Houston's Greens Crossing district.
                                  tw telecom Extends Nationwide Network Introducing Service in Boston
                                  tw telecom's industry-leading network solutions now available to enterprise customers across the Boston metropolitan area
                                  tw telecom announced it is expanding its nationwide network and extensive product suite by introducing service to customers in metropolitan Boston. The company is now deploying its industry-leading portfolio of data and Internet solutions, including its innovative Business Ethernet and Intelligent Network capabilities, to connect enterprise customers across the Boston area to their local and national destinations.
                                  Trending in
                                  Vol 235, Issue 3
                                  Trending IT Articles